必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '213.79.137.0 - 213.79.138.255'

% Abuse contact for '213.79.137.0 - 213.79.138.255' is 'info@norrnod.se'

inetnum:        213.79.137.0 - 213.79.138.255
netname:        Worldnet-Norr-AB
descr:          Consult Campany
country:        SE
admin-c:        ML17474-RIPE
tech-c:         NOD-RIPE
status:         ASSIGNED PA
mnt-by:         NORRNOD-MNT
created:        2002-08-13T13:54:02Z
last-modified:  2023-07-27T09:24:06Z
source:         RIPE

role:           NorrNod
address:        ITS
address:        Umea university
address:        901 87 Umea
address:        Sweden
phone:          +46 90 786 70 10
admin-c:        HGN11-RIPE
tech-c:         HGN11-RIPE
nic-hdl:        NOD-RIPE
mnt-by:         NORRNOD-MNT
created:        2002-08-13T10:54:45Z
last-modified:  2026-01-26T13:21:01Z
source:         RIPE # Filtered

person:         Magnus Lundstedt
address:        Worldnet AB
address:        Strompilen bod 2
address:        S-904 43 Umea
phone:          +46 90 13 53 70
fax-no:         +46 90 13 53 75
nic-hdl:        ML17474-RIPE
created:        1970-01-01T00:00:00Z
last-modified:  2020-06-04T10:00:27Z
source:         RIPE # Filtered
mnt-by:         NORRNOD-MNT

% Information related to '213.79.128.0/17AS12501'

route:          213.79.128.0/17
descr:          NorrNod
descr:          In case of improper use originating from our network,
descr:          please mail netmaster@umu.se
origin:         AS12501
mnt-by:         NORRNOD-MNT
mnt-routes:     NORRNOD-MNT
created:        2002-07-15T18:36:28Z
last-modified:  2024-10-22T06:29:47Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.79.137.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54716
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.79.137.232.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032601 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 03:09:35 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 232.137.79.213.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 213.79.137.232.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.175.93.101 attack
02/12/2020-17:15:52.298028 185.175.93.101 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-13 00:26:45
118.25.12.59 attack
Feb 12 16:55:26 MK-Soft-Root2 sshd[5386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.12.59 
Feb 12 16:55:27 MK-Soft-Root2 sshd[5386]: Failed password for invalid user fedor from 118.25.12.59 port 48634 ssh2
...
2020-02-13 00:47:41
114.67.239.215 attackbots
1581520438 - 02/12/2020 16:13:58 Host: 114.67.239.215/114.67.239.215 Port: 22 TCP Blocked
2020-02-13 00:24:52
213.251.224.17 attack
Feb 12 17:16:15 markkoudstaal sshd[28763]: Failed password for root from 213.251.224.17 port 44894 ssh2
Feb 12 17:18:19 markkoudstaal sshd[29114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.224.17
Feb 12 17:18:22 markkoudstaal sshd[29114]: Failed password for invalid user cssserver from 213.251.224.17 port 36950 ssh2
2020-02-13 00:28:26
123.16.50.31 attack
Port probing on unauthorized port 8291
2020-02-13 00:43:48
92.27.26.28 attackbotsspam
Unauthorised access (Feb 12) SRC=92.27.26.28 LEN=40 TTL=55 ID=35728 TCP DPT=23 WINDOW=40792 SYN
2020-02-13 00:41:06
78.188.7.69 attackbots
Automatic report - Port Scan Attack
2020-02-13 00:12:26
49.88.112.115 attackbots
Feb 12 06:48:51 php1 sshd\[29515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Feb 12 06:48:53 php1 sshd\[29515\]: Failed password for root from 49.88.112.115 port 17992 ssh2
Feb 12 06:49:55 php1 sshd\[29583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Feb 12 06:49:57 php1 sshd\[29583\]: Failed password for root from 49.88.112.115 port 42251 ssh2
Feb 12 06:50:57 php1 sshd\[29652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
2020-02-13 00:58:16
60.250.48.187 attackspam
20/2/12@08:44:44: FAIL: Alarm-Network address from=60.250.48.187
...
2020-02-13 00:45:10
219.93.106.33 attackbots
2020-02-12T13:28:57.527317  sshd[24933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.93.106.33  user=root
2020-02-12T13:28:59.276234  sshd[24933]: Failed password for root from 219.93.106.33 port 41481 ssh2
2020-02-12T14:45:11.236407  sshd[26205]: Invalid user support from 219.93.106.33 port 41481
2020-02-12T14:45:11.251785  sshd[26205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.93.106.33
2020-02-12T14:45:11.236407  sshd[26205]: Invalid user support from 219.93.106.33 port 41481
2020-02-12T14:45:13.265927  sshd[26205]: Failed password for invalid user support from 219.93.106.33 port 41481 ssh2
...
2020-02-13 00:08:02
222.186.180.142 attackbots
Feb 12 21:58:40 areeb-Workstation sshd[27576]: Failed password for root from 222.186.180.142 port 40746 ssh2
Feb 12 21:58:43 areeb-Workstation sshd[27576]: Failed password for root from 222.186.180.142 port 40746 ssh2
...
2020-02-13 00:30:42
190.131.201.122 attackbots
Unauthorized SSH login attempts
2020-02-13 00:20:40
111.204.243.142 attackspam
firewall-block, port(s): 1433/tcp
2020-02-13 00:17:44
129.204.210.40 attackspam
Feb 12 16:39:30 lnxded64 sshd[18986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.210.40
Feb 12 16:39:33 lnxded64 sshd[18986]: Failed password for invalid user redhat from 129.204.210.40 port 42656 ssh2
Feb 12 16:42:45 lnxded64 sshd[19633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.210.40
2020-02-13 00:51:54
80.82.77.189 attackbots
Fail2Ban Ban Triggered
2020-02-13 00:27:54

最近上报的IP列表

164.155.74.46 66.132.172.140 112.86.225.238 144.123.76.162
2606:4700:10::ac43:669 2606:4700:10::6814:6066 2606:4700:10::6816:373d 2606:4700:10::6814:5067
2606:4700:10::6814:7551 2606:4700:10::6814:5681 2606:4700:10::6814:6782 2606:4700:10::6814:8101
64.20.76.111 62.48.69.172 39.3.217.85 195.178.110.152
219.152.92.137 176.255.195.7 175.236.60.208 54.224.250.82